FB-ISAO Threat Levels Explainer
The current FB-ISAO Threat Level Statement is available here. In 2011, the Department of Homeland Security (DHS) replaced the color-coded alerts of the Homeland...
The current FB-ISAO Threat Level Statement is available here. In 2011, the Department of Homeland Security (DHS) replaced the color-coded alerts of the Homeland...
The current FB-ISAO Threat Level Statement is available here. In 2011, the Department of Homeland Security (DHS) replaced the color-coded alerts of the Homeland...
By Jennifer Lyn Walker As highlighted in the December 2019 FB-ISAO Newsletter, one of the earmarks of a successful information sharing organization is receiving...
by Andy Jabbour, Managing Director, FB-ISAO TL;DR: FB-ISAO’s Preparedness Goal: “Secure and resilient houses of worship, faith-based organizations, charities, and other non-profits with the [&h...
What could we possibly learn about cybersecurity from the Charles Dickens classic: A Christmas Carol, you ask? Well, pardon our parallels and allow us some latitude as we explore this holiday classic with a cyber theme...
“The need to preserve the right to peacefully congregate and practice a religion of choice is integral in the Constitution, and an attack against [...
During the aftermath of any suspicious activity, emergency, hostile event, or disaster is a prime opportunity to examine organizational incident response procedures for any potential weakness. When weaknesses are identified, the solution...
Associated risks are potential unwanted outcomes resulting from an incident, event, or occurrence in nearby proximity, that may not be connected to the specific organization or location. In many instances, the associated risk stems from...
Once a target is selected, the attacker will resolve outstanding questions about the target environment, expand collection efforts through surveillance, and seek to adequately address remaining unknowns in order to ensure their attack is...
In this and future posts, we will explore the HEAC in greater detail, focusing on steps in the cycle, how the attacker conducts each step, and how organizations can prepare to defend against potential attacks. In this post we cover how...
Over the past several weeks, ransomware has been a widespread topic. However, on 02 July there was a bit of good news for a change. St John Ambulance, a “not-for-profit provider of specialist patient transport services across England” adv...